SlideShare una empresa de Scribd logo
1 de 42
Descargar para leer sin conexión
How to prevent a
disaster in cyberspace ?
The need for an international approach
to undermine the criminal cyber architecture

                             Berlin, 8 february 2012
                             Combating Cybercrime in Europe – fighting botnets
                             Optimised Tools for Investigation and Law Enforcement
© 2012 Luc Beirens – Federal Computer Crime Unit - Belgian Federal Judicial Police – Direction economical and financial crime
Presentation

 @LucBeirens
 Chief Commissioner
 Head of the Federal Computer Crime Unit
 Belgian Federal Judicial Police
 Direction Economical and financial crime




                   Chairman of the EU Cybercrime task force
                   representing the organization of heads of
                   national hightech crime units of the EU
Topics - overview

 General trends today

 Cyber crimes and cyber criminals today

 What hinders the combat today ?

 A proposal for an integrated response

 Belgian experiences
General trends today
 Evolution towards e-society
   replace persons by e-applications
   Interconnecting all systems (admin, industrial, control)

 IP is common platform offered by many ISPs
  integrating telephony / data / VPN & all new apps
  =opportunities / Achilles tendon / scattered traces

 Poor security in legacy applications and
  protocols (userid+pw)=> identity fraud is easy

 Enduser is not yet educated to act properly
What do criminals want ?

 Become rich / powerfull
 rapidly, easily, very big ROI
 in an illegal way if needed


 Destabilaze (e-)society
 by causing troubles
How : cyber crimes today

 e-fraud => give money to the criminals
 spam => start for eFrauds / MW distrib
 hacking =>
     change content of your website (defacing)
     transfer money from the hacked system
     espionnage => know your victim
     use of hacked system =>
      storage / spam / proxy / DNS / CC / DDOS
 DDOS distributed denial of service attacks
How to combat
cyber criminals ?
Analyse their methods and tools
Webserver / node

                                                Computer
                                                 Crash
       Hacker

                                     Internet

      Info                            Access line
Cmd
                                      blocked


                  My IP is x.y.z.z

 Command &        Botnet attack on a webserver / node
 Control Server
Interesting DDOS


   2004 UK : gambling website down (+ hoster + ISP)
   2005 Netherlands : 2 botnets : millions of zombies
   2005 Belgium : Commercial firm during social conflict
   2006 Sweden : Gov websites after police raid on P2P
   2007 Estonia : political inspired widespread DDOS attack
   2008 Georgia : cyber war during military conflict
   2010 Worldwide : Wikileaks cyberconflict
   2011 – 2012 : Anonymous attacks on Gov sites
What are botnets used for ?
Getting data & making money !
 Sometimes still for fun (scriptkiddies)

   Spam distribution via Zombie
   Click generation on banner publicity
   Dialer installation on zombie to make premium rate calls
   Spyware / malware / ransomware installation

 Espionage : banking details / passwords / keylogging
 Transactions via zombie PC

 Capacity for distributed denial of service attacks DDOS
  => disturb functioning of internet device (server/router)
Webserver / node




      Hacker         Knowledge server


                                            Internet


                       trigger
                       event

                                           MW update

                                        Very frequent MW
                                        update request

                                                Malware update server

Command &        Malware update / knowledge transfer
Control Server
Cyber criminal’s toolbox
 malware => trojan horses
   distribution via mail, p2p, social networks, websites
   auto-update & auto-propagation in network
   very high rate of new versions
 remote control of infected systems
  => botnets
 creation of knowledge databases
   collected & keylogged info of infected pc
 keyservers in safe haven countries
But the criminal cyber architecture
also includes ...

 Underground fora and chatrooms
     Botnets for hire
     Malware on demand / off the shelf packages
     Trade stolen Credit cards / credentials
     Money laundering services

 Organized Cyber criminals
   take over / set up ISP’s
   infiltrate in development firms
And the victims ?
 Who ?
   Communication networks and service providers
   Companies especially transactional websites
   Every internet user


 Reaction
   Unaware of incidents going on => dark number
   Victims try to solve it themselves
   Nearly no complaints made => dark number

 Result ? The hackers go on developing botnets
Risks

 Economical disaster
   Large scale : critical infrastructure
   Small scale : enterprise


 Individual & corporate (secret) data

 Loss of trust in e-society
Combined threat

 What if abused by terrorists ? Cyber army ?
  ... simultaniously with a real world attack?

 How will you handle the crisis ?
  Your telephone system is not working !
Intermediate conclusions

 Society is very dependant of ICT
 eSociety is very vulnerable for attacks

 Urgent need to reduce risks on critical ICT

 Botnets as criminal cyber infrastructure
  is common platform for lots of cybercrimes

 => undermine it and you reduce crime
Traditional way of law enforcement
to tackle cybercrime

 Reactive
   Register complaint => judicial case
   Hotlines (or cooperation with)
   (Eventualy) undercover operations

 Proactive (?)
   Who is doing what, where and how ?
   Patrolling the net

 Effective (?) but not undermining cybercriminals
What hinders an effective
combat of cyber crime ?
 Unawareness and negligence end user
 Lack of overall view on risks / incidents by
     Enterprise managers
     Political decision makers
   Combating : everyone on his own
   Lack of specialized investigators
   Jurisdictions limited by national borders
   Subscriber identity fraud
   Mobility of the (criminal) services in cloud
What actions are needed ?
Everyone plays a role in e-security

We have to do it as partners
We have to do it in an integrated way
Goals for operational
cybercrime action plan
 As “society” (= gov & private sector)
  improve detection and get a view and act on
   criminal cyberinfrastructure especially botnets
   incidents threatening eSociety

 Strengthen robustness of ICT eSociety
    ISP’s / Enterprises / End users
 Weaken and dismantle
  the criminal cyberinfrastructure
   Each partner within his role & competence
Preserve evidence     Webserver / node

                                    Report incident
                   Stop activity
                   Bring to court
          Hacker


                                    Internet
Take out of
order
Analyse to
identify hacker
& zombies                                     Identify critical infrastructure
                                                      Alarm procedures
                                                          Preserve evidence

                                          Prevent infection & MW autopropagation

                                          Detect infections & desinfect
 Botnetservers
 CC, Knowledge, MW   Actions against botnet architecture
Role of governments &
 international organizations
 Working according a strategy

 Develop international plans & reaction schemes
  for critical ICT infrastructure protection

 Develop legal framework
     Obligation to report cybercrime incidents
     Obligation to secure your computersystem (?)
     Possibility for ISP to cut off infected machines (?)
     Obligation to respond to requests of Gov authority
      when serious incidents happen
Telecommunications sector

   Prevent / reduce SPAM
   Have to make there infrastructure robust
   Report serious incidents to CERT
   Integrated reaction with authorities

 Implement strong authentication in
  internet protocols and services

 Detect negligent end users & react/help/cut off
Enterprises

 E-Security = business risk =>
  management responsibility

 Think about how to survive when
  e-systems are under attack

 Enforce detection of incidents – IDS ?
 Report incidents to CERT ? to police ?

 Integrate strong authentication in
  e-business applications
Developers

 Strong authentication
   Use the strongest available but ...
   Think as a hacker
    How can a transaction on an infected PC
    be intercepted ?


 Store IP-addresses and timestamps
   of the end user ! not of the router !
   Needed in case of an incident !
Responsibilization of end user

 Awareness raising => media

 Training on e-security & attitude
   already at school
   in the enterprises

 Obligation to secure his PC properly ?
Role of police and justice ?

 Gather intelligence about Botnets

 Dismantle botnet servers
  in your country

 Analyse Botnet-servers
  to find traces to criminals

 Focus on knowledge servers & CC servers
EU Council strategy :
COSI priorities and OAP ?
 Standing Committee on Operational Cooperation on
  Internal Security (COSI)
 EU Council body based on Lisbon Treaty (Art 71 TFEU)
 High-level representatives of MS Min Interior and EC
 Tasks
    to facilitate and ensure effective operational cooperation and
     coordination in the field of EU internal security
    to evaluate the general direction and efficiency of operational
     cooperation
    to assist the Council in reacting to terrorist attacks or natural or
     man-made disasters (solidarity clause of Art 222 TFEU).
                      Overview COSI strategic goals and operational   30
                                action plans cybercrime
Harmony : the COSI
policy & implementation cycle
 Normally : 4 year cycle except first cycle : 2 year
 Policy
      Create view on security risks and crime phenomenae
      Determine priority domains (Cybercrime is prio 8)
      Determine strategic goals 4 (2) year
      Determine operational action plans OAP 1 year
      1 Driver to follow up Cybercrime domain
      1 or 2 leaders for each OAP
 7 strategic goals
                                                     31
COSI Strategy goals

1.   Common legal standard (adapted)
2.   User identification by Internet Governance
3.   Enhance Police & Justice cyber capabilities
4.   Establish European Cybercrime Center
5.   Strategy to disrupt crim ict infra esp. botnet
6.   PPP for prevention and detection
7.   Reporting systems in each MS
Strategic Goal 4



To establish the European Cybercrime Centre (ECC)
to become the focal point
in the fight against cybercrime in the Union
contributing to faster reactions
in the event of cyber attacks



              Overview COSI strategic goals and operational   33
                        action plans cybercrime
European Cybercrime centre

 Place, role, tasks, organization still not clear
 Study by Rand Europe => decision 1st half 2012

 At Europol ?
 Improve law enforcement efforts tackling cybercrime

 Tasks
    Intelligence focal point : monitoring, detection, collection,
     analysis, alerting, information => core AWF Cyborg ?
    Develop a high level forensic capability
    Liaise with MS LEA, industry and internet governance
    R&D Develop good practices for prevention and PPP               34
Strategic Goal 5



 To establish and implement
 a common Union approach
 to disrupt and dismantle
 the criminal infrastructure in cyberspace,
 especially botnets


                                              35
International
Botnet actions
Problems with it ?
Belgian experience
 1 national FCCU +25 Regional CCU=175 officers
  (computer forensics & cybercrime combat)
 2 specialized Federal prosecutors
  minimum 1 ICT reference prosecutor / district
 FCCU analyses attacks on critical ICT infra

 BelNIS Gov Network information security
   Develops and organizes ICT security strategy
   Problem : no central authority
 Since 2009 : Cert.be for Gov and Critical infra
Belgian experience
 eBanking fraud => start of Malware analysis
    Gain insight in how it’s working
    Leads to detection of botnet-servers / bogus ISP’s
 Combined team cybercrime & financial investigators
 Building trust with law enforcement with other
  countries
 Collaboration with several partners and organizations
  => Information send to & analysed by Cert.be

 Effective in dismantling of Botnet-servers (70 since ‘09)
 Impact of 1 Malware distribution server ? Analysis shows
    2 months 1,5 million downloads, 300.000 unique IP’s
Problems
 Botnet-servers often on victim’s servers
   But is it really a victim ?
 No knowledge-servers in BE
 Language problem during analysis CC-server
 Is it the role of the police / Cert ?
   If Cert does it (eg Finland)
      => fast but do we go after criminals afterwards ?
      Which incidents are severe enough to report to police ?
   If police does it
      Which botnet-servers do we analyse ?
      Malware analysis => help from AV-industry ?
Do we really have an impact ?


 Several hundreds of botnets
 5.000 – 10.000 botnet servers world wide
 Millions of infected end users

 => need for action in every country
Contact information

Federal Judicial Police
Direction for Economical and Financial crime
Federal Computer Crime Unit
Notelaarstraat 211 - 1000 Brussels – Belgium

Tel office   : +32 2 743 74 74
Fax          : +32 2 743 74 19

E-mail       : luc.beirens@fccu.be
Twitter      : @LucBeirens
Blog         : LucBeirens.blogspot.com

Más contenido relacionado

La actualidad más candente

Models of Escalation and De-escalation in Cyber Conflict
Models of Escalation and De-escalation in Cyber ConflictModels of Escalation and De-escalation in Cyber Conflict
Models of Escalation and De-escalation in Cyber ConflictZsolt Nemeth
 
S nandakumar
S nandakumarS nandakumar
S nandakumarIPPAI
 
Computer Security and Safety, Ethics & Privacy
Computer Security and Safety, Ethics & PrivacyComputer Security and Safety, Ethics & Privacy
Computer Security and Safety, Ethics & PrivacySamudin Kassan
 
Spam and Phishing Report - Marzo 2010
Spam and Phishing Report - Marzo 2010Spam and Phishing Report - Marzo 2010
Spam and Phishing Report - Marzo 2010Symantec Italia
 
E crime thesis Cyber Crime and its several types
E crime thesis  Cyber Crime and its several typesE crime thesis  Cyber Crime and its several types
E crime thesis Cyber Crime and its several typesAssignment Studio
 
Unit iii: Common Hacking Techniques
Unit iii: Common Hacking TechniquesUnit iii: Common Hacking Techniques
Unit iii: Common Hacking TechniquesArnav Chowdhury
 
E-commerce & Security
E-commerce & SecurityE-commerce & Security
E-commerce & SecurityNetstarterSL
 
Francesca Bosco, Cybercrimes - Bicocca 31.03.2011
Francesca Bosco, Cybercrimes  - Bicocca 31.03.2011Francesca Bosco, Cybercrimes  - Bicocca 31.03.2011
Francesca Bosco, Cybercrimes - Bicocca 31.03.2011Andrea Rossetti
 
Bright talk intrusion prevention are we joking - henshaw july 2010 a
Bright talk   intrusion prevention are we joking - henshaw july 2010 aBright talk   intrusion prevention are we joking - henshaw july 2010 a
Bright talk intrusion prevention are we joking - henshaw july 2010 aMark Henshaw
 
Internet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issuesInternet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issuesPierluigi Paganini
 
Chapter11
Chapter11Chapter11
Chapter11Izaham
 

La actualidad más candente (18)

Models of Escalation and De-escalation in Cyber Conflict
Models of Escalation and De-escalation in Cyber ConflictModels of Escalation and De-escalation in Cyber Conflict
Models of Escalation and De-escalation in Cyber Conflict
 
285 288
285 288285 288
285 288
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cybercrimes
CybercrimesCybercrimes
Cybercrimes
 
S nandakumar
S nandakumarS nandakumar
S nandakumar
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Computer Security and Safety, Ethics & Privacy
Computer Security and Safety, Ethics & PrivacyComputer Security and Safety, Ethics & Privacy
Computer Security and Safety, Ethics & Privacy
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
 
Spam and Phishing Report - Marzo 2010
Spam and Phishing Report - Marzo 2010Spam and Phishing Report - Marzo 2010
Spam and Phishing Report - Marzo 2010
 
E crime thesis Cyber Crime and its several types
E crime thesis  Cyber Crime and its several typesE crime thesis  Cyber Crime and its several types
E crime thesis Cyber Crime and its several types
 
Unit iii: Common Hacking Techniques
Unit iii: Common Hacking TechniquesUnit iii: Common Hacking Techniques
Unit iii: Common Hacking Techniques
 
E-commerce & Security
E-commerce & SecurityE-commerce & Security
E-commerce & Security
 
Francesca Bosco, Cybercrimes - Bicocca 31.03.2011
Francesca Bosco, Cybercrimes  - Bicocca 31.03.2011Francesca Bosco, Cybercrimes  - Bicocca 31.03.2011
Francesca Bosco, Cybercrimes - Bicocca 31.03.2011
 
Bright talk intrusion prevention are we joking - henshaw july 2010 a
Bright talk   intrusion prevention are we joking - henshaw july 2010 aBright talk   intrusion prevention are we joking - henshaw july 2010 a
Bright talk intrusion prevention are we joking - henshaw july 2010 a
 
Internet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issuesInternet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issues
 
Chapter11
Chapter11Chapter11
Chapter11
 

Destacado

20140218 jongeren en sociale media : de gevaren
20140218 jongeren en sociale media : de gevaren20140218 jongeren en sociale media : de gevaren
20140218 jongeren en sociale media : de gevarenLuc Beirens
 
20140314 Belgian Senate Judicial action of police on social media
20140314 Belgian Senate Judicial action of police on social media20140314 Belgian Senate Judicial action of police on social media
20140314 Belgian Senate Judicial action of police on social mediaLuc Beirens
 
20121119 Cybercrime : a basis for cyberwar ?
20121119 Cybercrime : a basis for cyberwar ?20121119 Cybercrime : a basis for cyberwar ?
20121119 Cybercrime : a basis for cyberwar ?Luc Beirens
 
20111216 La réputation de votre entreprise en danger sur le net
20111216 La réputation de votre entreprise en danger sur le net20111216 La réputation de votre entreprise en danger sur le net
20111216 La réputation de votre entreprise en danger sur le netLuc Beirens
 
20120613 e-banking fraud situation - BE law enforcement reaction
20120613 e-banking fraud situation - BE law enforcement reaction20120613 e-banking fraud situation - BE law enforcement reaction
20120613 e-banking fraud situation - BE law enforcement reactionLuc Beirens
 
20140126 Cybercriminaliteit in België : overleven in een wereld van hackers e...
20140126 Cybercriminaliteit in België : overleven in een wereld van hackers e...20140126 Cybercriminaliteit in België : overleven in een wereld van hackers e...
20140126 Cybercriminaliteit in België : overleven in een wereld van hackers e...Luc Beirens
 
20130321 Cybercrime threats on e-commerce online shops
20130321 Cybercrime threats on e-commerce online shops20130321 Cybercrime threats on e-commerce online shops
20130321 Cybercrime threats on e-commerce online shopsLuc Beirens
 

Destacado (7)

20140218 jongeren en sociale media : de gevaren
20140218 jongeren en sociale media : de gevaren20140218 jongeren en sociale media : de gevaren
20140218 jongeren en sociale media : de gevaren
 
20140314 Belgian Senate Judicial action of police on social media
20140314 Belgian Senate Judicial action of police on social media20140314 Belgian Senate Judicial action of police on social media
20140314 Belgian Senate Judicial action of police on social media
 
20121119 Cybercrime : a basis for cyberwar ?
20121119 Cybercrime : a basis for cyberwar ?20121119 Cybercrime : a basis for cyberwar ?
20121119 Cybercrime : a basis for cyberwar ?
 
20111216 La réputation de votre entreprise en danger sur le net
20111216 La réputation de votre entreprise en danger sur le net20111216 La réputation de votre entreprise en danger sur le net
20111216 La réputation de votre entreprise en danger sur le net
 
20120613 e-banking fraud situation - BE law enforcement reaction
20120613 e-banking fraud situation - BE law enforcement reaction20120613 e-banking fraud situation - BE law enforcement reaction
20120613 e-banking fraud situation - BE law enforcement reaction
 
20140126 Cybercriminaliteit in België : overleven in een wereld van hackers e...
20140126 Cybercriminaliteit in België : overleven in een wereld van hackers e...20140126 Cybercriminaliteit in België : overleven in een wereld van hackers e...
20140126 Cybercriminaliteit in België : overleven in een wereld van hackers e...
 
20130321 Cybercrime threats on e-commerce online shops
20130321 Cybercrime threats on e-commerce online shops20130321 Cybercrime threats on e-commerce online shops
20130321 Cybercrime threats on e-commerce online shops
 

Similar a 20120208 Strategical approach to tacle cybercrime & the botnet threat

CYBER-CRIME PRESENTATION with real-time examples
CYBER-CRIME PRESENTATION with real-time examplesCYBER-CRIME PRESENTATION with real-time examples
CYBER-CRIME PRESENTATION with real-time examplesVivekanandaGN1
 
CYBER-CRIME PRESENTATION.ppt
CYBER-CRIME PRESENTATION.pptCYBER-CRIME PRESENTATION.ppt
CYBER-CRIME PRESENTATION.pptPraveen362297
 
CYBER CRIME PRESENTATION for Law Students for Semester four
CYBER CRIME PRESENTATION for Law Students for Semester fourCYBER CRIME PRESENTATION for Law Students for Semester four
CYBER CRIME PRESENTATION for Law Students for Semester fourssuser24dae7
 
Cyber Risk Management in the New Digitalisation Age - eSentinel™
Cyber Risk Management in the New Digitalisation Age - eSentinel™ Cyber Risk Management in the New Digitalisation Age - eSentinel™
Cyber Risk Management in the New Digitalisation Age - eSentinel™ Netpluz Asia Pte Ltd
 
presentation_cybercrime_1486105587_257582.ppt
presentation_cybercrime_1486105587_257582.pptpresentation_cybercrime_1486105587_257582.ppt
presentation_cybercrime_1486105587_257582.pptJatinRajput67
 
Cyber crime and security 1
Cyber crime and security 1Cyber crime and security 1
Cyber crime and security 1indhuchezhian
 
AGILIS: an on-line map reduce environment for collaborative security
AGILIS: an on-line map reduce environment for collaborative securityAGILIS: an on-line map reduce environment for collaborative security
AGILIS: an on-line map reduce environment for collaborative securityRoberto Baldoni
 
Cyber crimes (By Mohammad Ahmed)
Cyber crimes (By Mohammad Ahmed)Cyber crimes (By Mohammad Ahmed)
Cyber crimes (By Mohammad Ahmed)Mohammad Ahmed
 
5 network-security-threats
5 network-security-threats5 network-security-threats
5 network-security-threatsReadWrite
 
Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112Erik Ginalick
 
Cyber crime & security final tapan
Cyber crime & security final tapanCyber crime & security final tapan
Cyber crime & security final tapanTapan Khilar
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and SecurityMd Nishad
 

Similar a 20120208 Strategical approach to tacle cybercrime & the botnet threat (20)

Cyber crime & security
Cyber crime & security Cyber crime & security
Cyber crime & security
 
CYBER-CRIME PRESENTATION with real-time examples
CYBER-CRIME PRESENTATION with real-time examplesCYBER-CRIME PRESENTATION with real-time examples
CYBER-CRIME PRESENTATION with real-time examples
 
CYBER-CRIME PRESENTATION.ppt
CYBER-CRIME PRESENTATION.pptCYBER-CRIME PRESENTATION.ppt
CYBER-CRIME PRESENTATION.ppt
 
CYBER CRIME PRESENTATION for Law Students for Semester four
CYBER CRIME PRESENTATION for Law Students for Semester fourCYBER CRIME PRESENTATION for Law Students for Semester four
CYBER CRIME PRESENTATION for Law Students for Semester four
 
Cyber Risk Management in the New Digitalisation Age - eSentinel™
Cyber Risk Management in the New Digitalisation Age - eSentinel™ Cyber Risk Management in the New Digitalisation Age - eSentinel™
Cyber Risk Management in the New Digitalisation Age - eSentinel™
 
cyber crime
cyber crimecyber crime
cyber crime
 
presentation_cybercrime_1486105587_257582.ppt
presentation_cybercrime_1486105587_257582.pptpresentation_cybercrime_1486105587_257582.ppt
presentation_cybercrime_1486105587_257582.ppt
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Cyber crime and security 1
Cyber crime and security 1Cyber crime and security 1
Cyber crime and security 1
 
AGILIS: an on-line map reduce environment for collaborative security
AGILIS: an on-line map reduce environment for collaborative securityAGILIS: an on-line map reduce environment for collaborative security
AGILIS: an on-line map reduce environment for collaborative security
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
 
Cyber crimes (By Mohammad Ahmed)
Cyber crimes (By Mohammad Ahmed)Cyber crimes (By Mohammad Ahmed)
Cyber crimes (By Mohammad Ahmed)
 
UNIT 5.docx
UNIT 5.docxUNIT 5.docx
UNIT 5.docx
 
5 network-security-threats
5 network-security-threats5 network-security-threats
5 network-security-threats
 
Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112
 
Cyber crime & security final tapan
Cyber crime & security final tapanCyber crime & security final tapan
Cyber crime & security final tapan
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime & Security
Cyber Crime & SecurityCyber Crime & Security
Cyber Crime & Security
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 

Último

Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfAdmir Softic
 
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service NoidaCall Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service Noidadlhescort
 
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...rajveerescorts2022
 
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...Sheetaleventcompany
 
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...amitlee9823
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...amitlee9823
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876dlhescort
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityEric T. Tung
 
Phases of Negotiation .pptx
 Phases of Negotiation .pptx Phases of Negotiation .pptx
Phases of Negotiation .pptxnandhinijagan9867
 
Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876
Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876
Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876dlhescort
 
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentationuneakwhite
 
Eluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort Service
Eluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort ServiceEluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort Service
Eluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort ServiceDamini Dixit
 
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...amitlee9823
 
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...lizamodels9
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756dollysharma2066
 
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...amitlee9823
 
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...Sheetaleventcompany
 
PHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation FinalPHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation FinalPanhandleOilandGas
 

Último (20)

Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
 
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service NoidaCall Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
 
Falcon Invoice Discounting platform in india
Falcon Invoice Discounting platform in indiaFalcon Invoice Discounting platform in india
Falcon Invoice Discounting platform in india
 
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
 
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabiunwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
 
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...
 
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League City
 
Phases of Negotiation .pptx
 Phases of Negotiation .pptx Phases of Negotiation .pptx
Phases of Negotiation .pptx
 
Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876
Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876
Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876
 
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentation
 
Eluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort Service
Eluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort ServiceEluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort Service
Eluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort Service
 
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
 
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
 
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
 
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
 
PHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation FinalPHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation Final
 

20120208 Strategical approach to tacle cybercrime & the botnet threat

  • 1. How to prevent a disaster in cyberspace ? The need for an international approach to undermine the criminal cyber architecture Berlin, 8 february 2012 Combating Cybercrime in Europe – fighting botnets Optimised Tools for Investigation and Law Enforcement © 2012 Luc Beirens – Federal Computer Crime Unit - Belgian Federal Judicial Police – Direction economical and financial crime
  • 2. Presentation  @LucBeirens Chief Commissioner Head of the Federal Computer Crime Unit Belgian Federal Judicial Police Direction Economical and financial crime Chairman of the EU Cybercrime task force representing the organization of heads of national hightech crime units of the EU
  • 3. Topics - overview  General trends today  Cyber crimes and cyber criminals today  What hinders the combat today ?  A proposal for an integrated response  Belgian experiences
  • 4. General trends today  Evolution towards e-society  replace persons by e-applications  Interconnecting all systems (admin, industrial, control)  IP is common platform offered by many ISPs integrating telephony / data / VPN & all new apps =opportunities / Achilles tendon / scattered traces  Poor security in legacy applications and protocols (userid+pw)=> identity fraud is easy  Enduser is not yet educated to act properly
  • 5. What do criminals want ?  Become rich / powerfull rapidly, easily, very big ROI in an illegal way if needed  Destabilaze (e-)society by causing troubles
  • 6. How : cyber crimes today  e-fraud => give money to the criminals  spam => start for eFrauds / MW distrib  hacking =>  change content of your website (defacing)  transfer money from the hacked system  espionnage => know your victim  use of hacked system => storage / spam / proxy / DNS / CC / DDOS  DDOS distributed denial of service attacks
  • 7. How to combat cyber criminals ? Analyse their methods and tools
  • 8. Webserver / node Computer Crash Hacker Internet Info Access line Cmd blocked My IP is x.y.z.z Command & Botnet attack on a webserver / node Control Server
  • 9. Interesting DDOS  2004 UK : gambling website down (+ hoster + ISP)  2005 Netherlands : 2 botnets : millions of zombies  2005 Belgium : Commercial firm during social conflict  2006 Sweden : Gov websites after police raid on P2P  2007 Estonia : political inspired widespread DDOS attack  2008 Georgia : cyber war during military conflict  2010 Worldwide : Wikileaks cyberconflict  2011 – 2012 : Anonymous attacks on Gov sites
  • 10. What are botnets used for ? Getting data & making money !  Sometimes still for fun (scriptkiddies)  Spam distribution via Zombie  Click generation on banner publicity  Dialer installation on zombie to make premium rate calls  Spyware / malware / ransomware installation  Espionage : banking details / passwords / keylogging  Transactions via zombie PC  Capacity for distributed denial of service attacks DDOS => disturb functioning of internet device (server/router)
  • 11.
  • 12. Webserver / node Hacker Knowledge server Internet trigger event MW update Very frequent MW update request Malware update server Command & Malware update / knowledge transfer Control Server
  • 13. Cyber criminal’s toolbox  malware => trojan horses  distribution via mail, p2p, social networks, websites  auto-update & auto-propagation in network  very high rate of new versions  remote control of infected systems => botnets  creation of knowledge databases  collected & keylogged info of infected pc  keyservers in safe haven countries
  • 14. But the criminal cyber architecture also includes ...  Underground fora and chatrooms  Botnets for hire  Malware on demand / off the shelf packages  Trade stolen Credit cards / credentials  Money laundering services  Organized Cyber criminals  take over / set up ISP’s  infiltrate in development firms
  • 15. And the victims ?  Who ?  Communication networks and service providers  Companies especially transactional websites  Every internet user  Reaction  Unaware of incidents going on => dark number  Victims try to solve it themselves  Nearly no complaints made => dark number  Result ? The hackers go on developing botnets
  • 16. Risks  Economical disaster  Large scale : critical infrastructure  Small scale : enterprise  Individual & corporate (secret) data  Loss of trust in e-society
  • 17. Combined threat  What if abused by terrorists ? Cyber army ? ... simultaniously with a real world attack?  How will you handle the crisis ? Your telephone system is not working !
  • 18. Intermediate conclusions  Society is very dependant of ICT  eSociety is very vulnerable for attacks  Urgent need to reduce risks on critical ICT  Botnets as criminal cyber infrastructure is common platform for lots of cybercrimes => undermine it and you reduce crime
  • 19. Traditional way of law enforcement to tackle cybercrime  Reactive  Register complaint => judicial case  Hotlines (or cooperation with)  (Eventualy) undercover operations  Proactive (?)  Who is doing what, where and how ?  Patrolling the net  Effective (?) but not undermining cybercriminals
  • 20. What hinders an effective combat of cyber crime ?  Unawareness and negligence end user  Lack of overall view on risks / incidents by  Enterprise managers  Political decision makers  Combating : everyone on his own  Lack of specialized investigators  Jurisdictions limited by national borders  Subscriber identity fraud  Mobility of the (criminal) services in cloud
  • 21. What actions are needed ? Everyone plays a role in e-security We have to do it as partners We have to do it in an integrated way
  • 22. Goals for operational cybercrime action plan  As “society” (= gov & private sector) improve detection and get a view and act on  criminal cyberinfrastructure especially botnets  incidents threatening eSociety  Strengthen robustness of ICT eSociety  ISP’s / Enterprises / End users  Weaken and dismantle the criminal cyberinfrastructure  Each partner within his role & competence
  • 23. Preserve evidence Webserver / node Report incident Stop activity Bring to court Hacker Internet Take out of order Analyse to identify hacker & zombies Identify critical infrastructure Alarm procedures Preserve evidence Prevent infection & MW autopropagation Detect infections & desinfect Botnetservers CC, Knowledge, MW Actions against botnet architecture
  • 24. Role of governments & international organizations  Working according a strategy  Develop international plans & reaction schemes for critical ICT infrastructure protection  Develop legal framework  Obligation to report cybercrime incidents  Obligation to secure your computersystem (?)  Possibility for ISP to cut off infected machines (?)  Obligation to respond to requests of Gov authority when serious incidents happen
  • 25. Telecommunications sector  Prevent / reduce SPAM  Have to make there infrastructure robust  Report serious incidents to CERT  Integrated reaction with authorities  Implement strong authentication in internet protocols and services  Detect negligent end users & react/help/cut off
  • 26. Enterprises  E-Security = business risk => management responsibility  Think about how to survive when e-systems are under attack  Enforce detection of incidents – IDS ?  Report incidents to CERT ? to police ?  Integrate strong authentication in e-business applications
  • 27. Developers  Strong authentication  Use the strongest available but ...  Think as a hacker How can a transaction on an infected PC be intercepted ?  Store IP-addresses and timestamps  of the end user ! not of the router !  Needed in case of an incident !
  • 28. Responsibilization of end user  Awareness raising => media  Training on e-security & attitude  already at school  in the enterprises  Obligation to secure his PC properly ?
  • 29. Role of police and justice ?  Gather intelligence about Botnets  Dismantle botnet servers in your country  Analyse Botnet-servers to find traces to criminals  Focus on knowledge servers & CC servers
  • 30. EU Council strategy : COSI priorities and OAP ?  Standing Committee on Operational Cooperation on Internal Security (COSI)  EU Council body based on Lisbon Treaty (Art 71 TFEU)  High-level representatives of MS Min Interior and EC  Tasks  to facilitate and ensure effective operational cooperation and coordination in the field of EU internal security  to evaluate the general direction and efficiency of operational cooperation  to assist the Council in reacting to terrorist attacks or natural or man-made disasters (solidarity clause of Art 222 TFEU). Overview COSI strategic goals and operational 30 action plans cybercrime
  • 31. Harmony : the COSI policy & implementation cycle  Normally : 4 year cycle except first cycle : 2 year  Policy  Create view on security risks and crime phenomenae  Determine priority domains (Cybercrime is prio 8)  Determine strategic goals 4 (2) year  Determine operational action plans OAP 1 year  1 Driver to follow up Cybercrime domain  1 or 2 leaders for each OAP  7 strategic goals 31
  • 32. COSI Strategy goals 1. Common legal standard (adapted) 2. User identification by Internet Governance 3. Enhance Police & Justice cyber capabilities 4. Establish European Cybercrime Center 5. Strategy to disrupt crim ict infra esp. botnet 6. PPP for prevention and detection 7. Reporting systems in each MS
  • 33. Strategic Goal 4 To establish the European Cybercrime Centre (ECC) to become the focal point in the fight against cybercrime in the Union contributing to faster reactions in the event of cyber attacks Overview COSI strategic goals and operational 33 action plans cybercrime
  • 34. European Cybercrime centre  Place, role, tasks, organization still not clear  Study by Rand Europe => decision 1st half 2012  At Europol ?  Improve law enforcement efforts tackling cybercrime  Tasks  Intelligence focal point : monitoring, detection, collection, analysis, alerting, information => core AWF Cyborg ?  Develop a high level forensic capability  Liaise with MS LEA, industry and internet governance  R&D Develop good practices for prevention and PPP 34
  • 35. Strategic Goal 5 To establish and implement a common Union approach to disrupt and dismantle the criminal infrastructure in cyberspace, especially botnets 35
  • 38. Belgian experience  1 national FCCU +25 Regional CCU=175 officers (computer forensics & cybercrime combat)  2 specialized Federal prosecutors minimum 1 ICT reference prosecutor / district  FCCU analyses attacks on critical ICT infra  BelNIS Gov Network information security  Develops and organizes ICT security strategy  Problem : no central authority  Since 2009 : Cert.be for Gov and Critical infra
  • 39. Belgian experience  eBanking fraud => start of Malware analysis  Gain insight in how it’s working  Leads to detection of botnet-servers / bogus ISP’s  Combined team cybercrime & financial investigators  Building trust with law enforcement with other countries  Collaboration with several partners and organizations => Information send to & analysed by Cert.be  Effective in dismantling of Botnet-servers (70 since ‘09)  Impact of 1 Malware distribution server ? Analysis shows  2 months 1,5 million downloads, 300.000 unique IP’s
  • 40. Problems  Botnet-servers often on victim’s servers  But is it really a victim ?  No knowledge-servers in BE  Language problem during analysis CC-server  Is it the role of the police / Cert ?  If Cert does it (eg Finland)  => fast but do we go after criminals afterwards ?  Which incidents are severe enough to report to police ?  If police does it  Which botnet-servers do we analyse ?  Malware analysis => help from AV-industry ?
  • 41. Do we really have an impact ?  Several hundreds of botnets  5.000 – 10.000 botnet servers world wide  Millions of infected end users => need for action in every country
  • 42. Contact information Federal Judicial Police Direction for Economical and Financial crime Federal Computer Crime Unit Notelaarstraat 211 - 1000 Brussels – Belgium Tel office : +32 2 743 74 74 Fax : +32 2 743 74 19 E-mail : luc.beirens@fccu.be Twitter : @LucBeirens Blog : LucBeirens.blogspot.com